Follow Dark Reading:
 February 23, 2017
LATEST SECURITY NEWS & COMMENTARY
Speak Up: Ransomware Attack Uses Voice Recognition
New variant of Android ransomware comes with a bizarre twist.
Fewer Than One-Fourth Of Cybersecurity Job Candidates Are Qualified
ISACA report finds that 55% of security jobs take three- to six months to fill, and under 25% of candidates are qualified for the jobs they apply for.
Why We Need To Reinvent How We Catalogue Malware
One obvious trend: crimeware technologies that come with simple user consoles and functionality to create unique binaries at the click of a button.
6 Tips for Preventing Laptop Data Theft
Experts point to stronger passwords, full-disk encryption, and multi-factor authentication as ways to stop data theft in the event a laptop is lost or stolen.
Tunneling Through The "Walls" Of IoT In The Enterprise
The movie "Die Hard" has a thing or two to teach us about the pitfalls of the Internet of Things.
80% Of Web Applications Contain At Least One Security Bug
Study by Contrast Security finds an average of 45 vulnerabilities per Web application.
Yahoo Trims Its Price Tag To Verizon By $350 Million
Announcement of new deal price from the previous $4.8 billion allays fears of deal cancellation or even bigger price cut.
MORE NEWS & COMMENTARY
HOT TOPICS
At Least 70 Organizations Targeted In Sophisticated Cyber Surveillance Operation
Most of the targets are in Ukraine, though a few have been spotted in Russia and elsewhere, CyberX says

Iran Intensifies Its Cyberattack Activity
Middle East targets - namely Saudi Arabia - are feeling the brunt of the attacks, but experts anticipate Iran will double down on hacking US targets.

Stolen Health Record Databases Sell For $500,000 In The Deep Web
Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.

MORE
EDITORS' CHOICE

8 Valuable Security Certifications For 2017
A security credential could be the step towards your next job title. But which one to get?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Your Private Medical Records Are for Sale. Companies Profit, But to What Peril?

    Author Adam Tanner joins All Analytics radio to talk about the process and issues around private medical records and how they are now being re-identified and used for commercial purposes. Join us for a don't miss discussion!

  • [Cybersecurity] Costs vs. Benefits

    This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.

MORE WEBINARS

Partner Perspectives

Survey: 14% Of IT Execs Would Pay $500K To Avoid 'Shaming' After A Breach
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.

Do Software-Defined Data Centers Pose Security Concerns?
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.